Impact
A use‑after‑free condition in the Downloads module of Google Chrome versions prior to 148.0.7778.168 allows a remote attacker to trigger arbitrary code execution when a user is tricked into performing specific UI gestures on a crafted HTML page. This weakness hinges on CWE‑416 and carries a high severity rating according to Chromium security.
Affected Systems
Chromium‑based browsers from Google, specifically Chrome versions before 148.0.7778.168. Users operating any of these releases are at risk, including those on Windows, macOS, and Linux platforms that have not yet applied the latest stable channel update.
Risk and Exploitability
Because the flaw requires only a web page that induces user interaction, the attack surface is broad. The EPSS score is unavailable, while the vulnerability is not listed in CISA's KEV catalog. Nonetheless, the high severity rating and the ability to exploit the flaw from a web page make this a serious threat that should be mitigated as soon as possible. The CVSS score is 8.8.
OpenCVE Enrichment
Debian DSA